3aa08f6a915fa5a8032d1add227a8070

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2024-Sep-14 00:52:16

Plugin Output

Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryExW
  • GetProcAddress
Possibly launches other programs:
  • CreateProcessW
Can create temporary files:
  • GetTempPathW
  • CreateFileW
Functions related to the privilege level:
  • OpenProcessToken
Enumerates local disk drives:
  • GetDriveTypeW
Suspicious The file contains overlay data. 8324823 bytes of data starting at offset 0x9b800.
The overlay data has an entropy of 7.99929 and is possibly compressed or encrypted.
Overlay data amounts for 92.8928% of the executable.
Malicious VirusTotal score: 4/71 (Scanned on 2024-11-21 00:45:33) APEX: Malicious
Bkav: W64.AIDetectMalware
Skyhigh: BehavesLike.Win64.Dropper.rc
Zillya: Trojan.Agent.Win32.3991781

Hashes

MD5 3aa08f6a915fa5a8032d1add227a8070
SHA1 986309adc0e789e4062c62370a415fded60dabe4
SHA256 93be45b662638cbdfc2e8cd7187dd6ecbe673178953d13ebde7861c3895010da
SHA3 a460cb4dbbe493f721b6c14bd17d43770b348c3bded66b067bad2f473da960cc
SSDeep 196608:FRwkvQ9L1pxaJczWbcdUrQj2mMYesRX0mFtXq3GE5Og2iZIv:3/vqXzW4CrCasRXBD4O0I
Imports Hash 72c4e339b7af8ab1ed2eb3821c98713a

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xf8

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 6
TimeDateStamp 2024-Sep-14 00:52:16
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x2a000
SizeOfInitializedData 0x71400
SizeOfUninitializedData 0
AddressOfEntryPoint 0x000000000000CDB0 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0xa3000
SizeOfHeaders 0x400
Checksum 0x89b61e
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x1e8480
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 a6c3b829cc8eaabb1a474c227e90407f
SHA1 2d9a342b9cea10af36a9defffc2a2fd763e338be
SHA256 2d2aed2a4e4a06095da38cac58f069e2793f70b601d123d5080c7b0a842e6912
SHA3 e271d55ddffba9ea27c0acf2bee52f1c104ec093a27c25004d04f49b4b038670
VirtualSize 0x29f00
VirtualAddress 0x1000
SizeOfRawData 0x2a000
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.48749

.rdata

MD5 8cd650a0a9549c3949c5759c22d2aa95
SHA1 aebf746e977e1fe7368b59db4e8d88c3ee65ccbe
SHA256 db601fab2083a5c73b75025abb481cdeeb6f35c0e3f2a47611a6df76b0133321
SHA3 6f3f9c69ebe03540c7e912e987f4bd24adbf1963efc1e3ed9b6819da0dd98a4f
VirtualSize 0x12a50
VirtualAddress 0x2b000
SizeOfRawData 0x12c00
PointerToRawData 0x2a400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.75278

.data

MD5 dba0caeecab624a0ccc0d577241601d1
SHA1 069fd3959f91e690643115a296bf21044144de01
SHA256 17a374764a97598eeb35b9f9e96bad505b780b2a64a325822e5c002f7fdc1966
SHA3 6f4a62f5b3771451f1409b76e8ad2c44d754c804580f1209eff1f5a96fb6decd
VirtualSize 0x53f8
VirtualAddress 0x3e000
SizeOfRawData 0xe00
PointerToRawData 0x3d000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 1.83922

.pdata

MD5 181312260a85d10a1454ba38901c499b
SHA1 09c2a6d5404bc19e11f7eddad07a164b42b01ee6
SHA256 1a30254e43a7ba40891fc6b0ee5b2ad8c4d9bc37d1564c8415aeb003f9d2c2fb
SHA3 70340f806ff22530f3adcad7f2c5373ab755d223eacad05b030cb24389878acb
VirtualSize 0x2250
VirtualAddress 0x44000
SizeOfRawData 0x2400
PointerToRawData 0x3de00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.29035

.rsrc

MD5 bc9e11396655d3e9f0f68d0ff8cadff3
SHA1 8e3d98b3f14d8016b7cc3872340422dd73503a3a
SHA256 4bba179587eebc7a1a9233133aca40ca961ce0e2a555ee7d8998bc9957c2f3d5
SHA3 aa3ef924bedae71725b986681490f4a7b7d277ba44362579a37a9f2b176f0eae
VirtualSize 0x5ac74
VirtualAddress 0x47000
SizeOfRawData 0x5ae00
PointerToRawData 0x40200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.67075

.reloc

MD5 816c68eeb419ee2c08656c31c06a0fff
SHA1 d73caf6099972c4407ac22954a7454e922084dc0
SHA256 b6f0828ba5501d261d26c59b0f79c32c6638d04e3c645417a5fa7e400a5016af
SHA3 62d280821f21ecb72eb7058070711484d2bae903b66ceb7cdbbf8f2b3bde274a
VirtualSize 0x764
VirtualAddress 0xa2000
SizeOfRawData 0x800
PointerToRawData 0x9b000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.28095

Imports

USER32.dll CreateWindowExW
ShutdownBlockReasonCreate
MsgWaitForMultipleObjects
ShowWindow
DestroyWindow
RegisterClassW
DefWindowProcW
PeekMessageW
DispatchMessageW
TranslateMessage
PostMessageW
GetMessageW
MessageBoxW
MessageBoxA
SystemParametersInfoW
DestroyIcon
SetWindowLongPtrW
GetWindowLongPtrW
GetClientRect
InvalidateRect
ReleaseDC
GetDC
DrawTextW
GetDialogBaseUnits
EndDialog
DialogBoxIndirectParamW
MoveWindow
SendMessageW
COMCTL32.dll #380
KERNEL32.dll GetACP
IsValidCodePage
GetStringTypeW
GetFileAttributesExW
SetEnvironmentVariableW
FlushFileBuffers
GetCurrentDirectoryW
LCMapStringW
CompareStringW
FlsFree
GetOEMCP
GetCPInfo
GetModuleHandleW
MulDiv
FormatMessageW
GetLastError
GetModuleFileNameW
LoadLibraryExW
SetDllDirectoryW
CreateSymbolicLinkW
GetProcAddress
GetEnvironmentStringsW
GetCommandLineW
GetEnvironmentVariableW
ExpandEnvironmentStringsW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetDriveTypeW
RemoveDirectoryW
GetTempPathW
CloseHandle
QueryPerformanceCounter
QueryPerformanceFrequency
WaitForSingleObject
Sleep
GetCurrentProcess
TerminateProcess
GetExitCodeProcess
CreateProcessW
GetStartupInfoW
FreeLibrary
LocalFree
SetConsoleCtrlHandler
K32EnumProcessModules
K32GetModuleFileNameExW
CreateFileW
FindFirstFileExW
GetFinalPathNameByHandleW
MultiByteToWideChar
WideCharToMultiByte
FlsSetValue
FreeEnvironmentStringsW
GetProcessHeap
GetTimeZoneInformation
HeapSize
HeapReAlloc
WriteConsoleW
SetEndOfFile
CreateDirectoryW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
RaiseException
RtlPcToFileHeader
GetCommandLineA
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ReadFile
GetFullPathNameW
SetStdHandle
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
HeapFree
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleOutputCP
GetFileSizeEx
HeapAlloc
FlsAlloc
FlsGetValue
ADVAPI32.dll OpenProcessToken
GetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidW
GDI32.dll SelectObject
DeleteObject
CreateFontIndirectW

Delayed Imports

1

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.06049
MD5 bdc5b75ce62a20cfb0cdd6cdd61edb97
SHA1 529550c402f45a79706d787df76b5cf2322a0f05
SHA256 0df5e977a9841196a9e775fb605ca7e68ef246ccda8561daef9b679499eb9e57
SHA3 88c96486080cd5a54a967738e032ca2423ec394075fac1a95133a5bbe176d693

2

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.07109
MD5 265590909fdbda51298fd4cf6856156f
SHA1 7bb9220d707bc9e57888cddfd8c85e9f9de7c03d
SHA256 2013f0fc9500f1fc7b8eec3494ef5c11099f1cffd423326c2167d6ab2d5e8248
SHA3 56a89a384ea2a14e7dd84295d038c32f543f41f0cb66b066028bbe370eae54cf

3

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.96509
MD5 581b7373d8182c03aa26504547395b2a
SHA1 fb98fd59ec1c891b43661a8e399cc9e9b44b3c5a
SHA256 9640673aed33fb2c31e0da3bd97ea1b2c5cd5552538e190498bcb484c7ebb4a4
SHA3 f0c9f1af8f2919286a49bf38990b7046209b888704b191f55a3a415ff3d33bdd

4

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x4228
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.88319
MD5 6a1ba75a1757e5ab390acbb9b5b8e404
SHA1 7ca0b20f66bb64eb210bb349c40db3faba2dba67
SHA256 f7e814e9d2fae463595cd3db86d3bb7e36f3f170146700ec45184be657e3e321
SHA3 b7a1a2b9724f9fe2986c34a4519af4c6a00774b22cb4700ad68c088a1ac54f9c

5

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x10828
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.69221
MD5 6f1ba1d6c59abb22c10e43fb7fc4f216
SHA1 209a301e12fead7619b3ff3f350aa9f2a14d1999
SHA256 af9cc298d693e8fc46d5550482da6a5c7a804b8066d2903f8ad4aa44ac66d911
SHA3 822d9fb439a0c3d91aaa2b5a98589936ba5a29f2ff02f2e408001d54868ac63f

6

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x42028
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.59797
MD5 edf81f7f6ef22f0cda0e7fc0abac232c
SHA1 9e51f5ec7b00791b71db30a9c1d746a8e261f99b
SHA256 b8980d3bd0c17e6d01436c4447c2aeea07609f60c1b491d6967f40524f6cb97f
SHA3 aebe356afa013d713b5abfc9f1a28d51e9bdf66981d8cc0363793ed199ef035d

1 (#2)

Type RT_GROUP_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x5a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.76511
Detected Filetype Icon file
MD5 61e58469fe660c213ebc6e2cc66cbafc
SHA1 c47479da87d8390f935b337e91bdbedcc739b3eb
SHA256 c369bebe3271775e43301281caa7efcd03938e3bc1f620212d6c5617edaad403
SHA3 7c04647ad931cbf1b5c005cebc686d11b461a50e14ba9aa560e6cc1749adcb2f

1 (#3)

Type RT_MANIFEST
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x50d
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.25791
MD5 84da8dee6b319ea0b10b6de5489c6aae
SHA1 5f8991f3e065fd95614859a293f88b9c70e4bb23
SHA256 abf8f2022f12f350789d961aceaf9ccfd53e7ec58d8c9934cfce77779b4eac11
SHA3 08f0562915b54bedce5a84e9d32cb2efcc538268785103b1852338e20a3b4606

Version Info

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2024-Sep-14 00:52:16
Version 0.0
SizeofData 796
AddressOfRawData 0x3a474
PointerToRawData 0x39874

TLS Callbacks

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x14003e040
GuardCFCheckFunctionPointer 5368886432
GuardCFDispatchFunctionPointer 0
GuardCFFunctionTable 0
GuardCFFunctionCount 0
GuardFlags (EMPTY)
CodeIntegrity.Flags 0
CodeIntegrity.Catalog 0
CodeIntegrity.CatalogOffset 0
CodeIntegrity.Reserved 0
GuardAddressTakenIatEntryTable 0
GuardAddressTakenIatEntryCount 0
GuardLongJumpTargetTable 0
GuardLongJumpTargetCount 0

RICH Header

XOR Key 0xf463705a
Unmarked objects 0
ASM objects (30795) 7
C++ objects (30795) 180
C objects (30795) 10
253 (33731) 3
ASM objects (33731) 9
C objects (33731) 17
C++ objects (33731) 40
Imports (30795) 11
Total imports 155
C objects (33813) 25
Linker (33813) 1

Errors

<-- -->